Skip to main content

Research Repository

Advanced Search

Outputs (103)

Related-key impossible differential cryptanalysis of full-round HIGHT (2013)
Conference Proceeding
Rostami, S., Bamohabbat Chafjiri, S., & Tabatabaei, S. A. H. (2015). Related-key impossible differential cryptanalysis of full-round HIGHT. In 2013 International Conference on Security and Cryptography (SECRYPT) (1-6)

The HIGHT algorithm is a 64-bit block cipher with 128-bit key length, at CHES'06 as a lightweight cryptographic algorithm. In this paper, a new related-key impossible differential attack on the full-round algorithm is introduced. Our cryptanalysis re... Read More about Related-key impossible differential cryptanalysis of full-round HIGHT.

Intelligent grid enabled services for neuroimaging analysis (2013)
Journal Article
McClatchey, R., Habib, I., Anjum, A., Munir, K., Branson, A., Bloodsworth, P., & Kiani, S. L. (2013). Intelligent grid enabled services for neuroimaging analysis. Neurocomputing, 122, 88-99. https://doi.org/10.1016/j.neucom.2013.01.042

This paper reports our work in the context of the neuGRID project in the development of intelligent services for a robust and efficient Neuroimaging analysis environment. neuGRID is an EC-funded project driven by the needs of the Alzheimer's disease... Read More about Intelligent grid enabled services for neuroimaging analysis.

Cloud based big data analytics for smart future cities (2013)
Presentation / Conference
Khan, Z., Anjum, A., & Kiani, S. L. (2013, December). Cloud based big data analytics for smart future cities. Paper presented at 6th International Conference on Utility and Cloud Computing, Dresden, Germany

ICT is becoming increasingly pervasive to urban environments and providing the necessary basis for sustainability and resilience of the smart future cities. Often ICT tools for a smart city deal with different application domains e.g. land use, trans... Read More about Cloud based big data analytics for smart future cities.

Towards a conceptual model and reasoning structure for insider threat detection (2013)
Journal Article
Legg, P., Moffat, N., Nurse, J., Happa, J., Agrafiotis, I., Goldsmith, M., & Creese, S. (2013). Towards a conceptual model and reasoning structure for insider threat detection

The insider threat faced by corporations and governments today is a real and significant problem, and one that has become increasingly difficult to combat as the years have progressed. From a technology standpoint, traditional protective measures suc... Read More about Towards a conceptual model and reasoning structure for insider threat detection.

Improving the efficiency of Market Information Analysis Systems using GIS, Polygon and Spatial Databases (2013)
Journal Article
Izadi, O., & Rakib, A. (2013). Improving the efficiency of Market Information Analysis Systems using GIS, Polygon and Spatial Databases. https://doi.org/10.1109/ICRIIS.2013.6716764

An organization's future developments are influenced by its managements' decisions. This can only happen by strengthening research and development strategies. Market monitoring and analyzing systems are designed to provide an organized flow of inform... Read More about Improving the efficiency of Market Information Analysis Systems using GIS, Polygon and Spatial Databases.

Ubiquitous sensor network management: The least interference beaconing model (2013)
Conference Proceeding
Bagula, A., Djenouri, D., & Karbab, E. (2013). Ubiquitous sensor network management: The least interference beaconing model. https://doi.org/10.1109/pimrc.2013.6666538

Network management is revisited in the emerging ubiquitous sensor networks (USNs) that form the Internet-of-the-Things (IoT) with the objective of evaluating the impact of traffic engineering on energy efficiency and assessing if routing simplicity t... Read More about Ubiquitous sensor network management: The least interference beaconing model.

Parallel software package for the construction and analysis of complex networks (2013)
Presentation / Conference
Ihshaish, H., & Dijkzeul, J. (2013, November). Parallel software package for the construction and analysis of complex networks. Poster presented at LINC Mid-Term Review, Potsdam, Germany

In climate research, big and complex networks could be generated by the big climate data produced by high resolution climate models, and also observations. To analyze such complex networks, there are two main computational challenges concerning both... Read More about Parallel software package for the construction and analysis of complex networks.

Trusted cloud computing framework for healthcare sector (2013)
Journal Article
Bamiah, M., Brohi, S., Chuprat, S., & Manan, J. (2014). Trusted cloud computing framework for healthcare sector. Journal of Computer Science, 10(2), 240-250. https://doi.org/10.3844/jcssp.2014.240.250

Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to... Read More about Trusted cloud computing framework for healthcare sector.

Design and implementation of a privacy preserved off-premises cloud storage (2013)
Journal Article
Chuprat, S., Ab, J. L., Bamiah, M. A., & Brohi, S. N. (2014). Design and implementation of a privacy preserved off-premises cloud storage. Journal of Computer Science, 10(2), 210-223. https://doi.org/10.3844/jcssp.2014.210.223

Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as Healthcare and Payment Card Industry where confident... Read More about Design and implementation of a privacy preserved off-premises cloud storage.